More

Pages

Saturday, 30 March 2013

CorelDRAW Graphics Suite X6 Free Download Software





Download Free CorelDRAW Graphics Suite X6 Software - Full Version

CorelDRAW Graphics Suite X6 16.3.0.1114 SP3Graphics | Original Install File + Update | OS: Windows XP/Vista/7/8 (x64x86) | 7.14 GBLanguages: English, French, Spanish, Portuguese (BR) | Content PackThe suite includes:• CorelDRAW X6. Intuitive vector illustration and page-layout application• Corel PHOTO-PAINT X6. Professional

Download Final Cut Pro X 10.0.8 with Motion Free Full Version





Download Final Cut Pro X 10.0.8 with Motion - Full Version Software

Apple Final Cut Pro X v10.0.8 with Motion 5 v5.0.7 Mac OSX | 2.45 GBWhat's New in Version 10.0.8• Support for Sony XAVC codec up to 4K resolution• Option to display ProRes Log C files from ARRI ALEXA cameras with standard Rec. 709 color and contrast levels• Resolves an issue where some third-party effects generated green

Autodesk Infrastructure Map Server Download Full Version Software





Download Autodesk Infrastructure Map Server Free - Full Version Software

 Autodesk Infrastructure Map Server V2014 WIN32/WIN64 - X FORCE | 692 MB + 897 MBPublish and share GIS mapsInstallation:Unpack, burn or mount with D-Tools & installCheck Crack/install.txt



DOWNLOAD LINKS:

Download Free Autodesk Infrastructure Map Server Software

Password: crackarchive.blogspot.com

Download Autodesk Alias Design V2014 MacOSX Free Software





Autodesk Alias Design V2014 MacOSX - Download Free Software

Autodesk Alias Design V2014 MacOSX - XFORCE | 1.10 GBIndustrial and automotive design toolsInstallation:Unpack, burn or mount with D-Tools & installCheck Crack/install.txt



DOWNLOAD LINKS:

 Download Autodesk Alias Design V2014 Mac OS X Free

Password: crackarchive.blogspot.com

Autodesk Inventor Pro Free Download Software





Download Autodesk Inventor Pro V2014 WiN64 - Free Software

Autodesk Inventor Pro V2014 WiN64 -ISO | 4.71 GB3D CAD software for mechanical designInstallation:Unpack, burn or mount with D-Tools & installCheck Crack/install.txt



DOWNLOAD LINKS:

Download Free Autodesk Inventor Pro Software



Thursday, 28 March 2013

'Biggest cyber-attack in history' slows down internet worldwide after quarrel between web-hosting company and anti-spam group

Internet users worldwide are having to endure slow connections after the biggest cyber-attack in history.



The attackers are throwing so much digital traffic at online networks that they have reportedly disrupted access to popular sites such as Netflix, the on-demand TV streaming service. 

Tonight there were fears that any worsening of the attack could affect web browsing and emails.

The onslaught has focused attention on the extent to which modern communications depend on the internet. Matthew Prince, chief executive of CloudFlare, one of the firms dealing with the assault, likened it to a series of digital “nuclear bombs”. “It’s so easy to cause so much damage,” he added.
The attack is believed to have begun last week, when Spamhaus, an anti-spam organisation, was hit by a wave of digital traffic that knocked its website offline. 

The body draws up  lists of the servers used to send spam messages around the world. Email administrators use these lists to block spam.

But last week one of the spammers irked by Spamhouse’s work is believed to have launched the massive distributed denial of service, or DDoS, attack to bring down the anti-spam group.

Doraemon Nobita South Sea Adventure Urdu Dubbing Full Movie


Doraemon Nobita South Sea

A beautiful Good Looking and Best entertainment cartoon of Doraemon see Full episode of South see Adventure in urdu without Browsing and with very high speed.

Sunday, 24 March 2013

Download TeraCopy Pro 2.27 Serial Key Free Full Version





Download TeraCopy Pro 2.27 Serial Key Free Full Version Software



Features:Copy files fasterPause and resume file transfer activitiesError recoveryInteractive file listShell integrationFull Unicode supportSave reports as HTML and CSV filesSelect files with the same extension/folderRemove the selected files from the copy queue and many more.Requirements:Windows XP/ Vista/ 7/ 8 (32 and 64

Download CyberLink Power2Go 8.0 Free Software





Download CyberLink Power2Go 8.0 Free - Full Version - Crack Software



Features:Ability to create mixed media discs (audio / video / photos on the same disk)Copy songs from your CDs to MP3, WMA or WAV filesDVD Authoring for creating a menu to record on DVDFull range of instruments for recording various file formats and disc typesInserting DVD chaptersInstant Search (search using file names

Download DivX Plus PRO 9.0.1 Free Full Version Software





 Free Download DivX Plus PRO 9.0.1 - Full Version Software



 Features:Easily transfer videosEnjoy DivX Plus advanced featuresManage your video libraryWatch purchased DivX moviesAdvanced DivX Plus/ MKVSurround yourself with soundEnhance your audio setupSRS AudioFusion DivX Edition and much more.



Requirement :Windows XP SP3/ Vista/ 7 (32 and 64 bit)32 MB of VGADirectX 9800 x 600 screen

UltraISO Premium Edition Crack Free Download Full Version Software





Download UltraISO Premium Edition Crack Free - Full Version Software

New Features:Optimized U+ v2 boot technologyImproved syslinux V3 or V4 support (Debian live 6.03, Knoppix 6.7, Backtrack 5, Fedora 15, OpenSUSE 11.4, CentOS Live 6, Mandriva Linux 2011)Includes Lame 3.99 encoderCan open BIF file of Acronis True Image 2012Supports virtual drives of Daemon-Tools Lite/Pro 4.41Can detect and

Download KMSnano Automatic Activator v23 Free





Free Download KMSnano Automatic Activator v23 - Crack Software



KMSnano v23 Automatic (Designed especially for W8 and Office 2013 installed in W8, It could or not work in W7)Requirements:- Requirements: .NET 4.0 or Windows 8.- Activates Windows Vista/7/8 Pro/Enter/N and Office 2010/2013 Retail/VL.Installation:1. Double-click on KMSnano.exe.2. Wait for the files to decompress.3. Wait for

Avast! Free Antivirus 7.0.1474 With License Key Free Download





Download Avast! Free Antivirus 7.0.1474 Free With License Key - Antivirus SoftwareAvast! Free Antivirus 7.0.1474Features:Anti-spyware built-in, Web Shield, Anti-root kit built-in, Automatic updates, Strong self-protection, Virus, Chest, Antivirus kernel, System integration, Simple User Interface, Integrated Virus



DOWNLOAD LINKS:

Download Avast! Free Antivirus 7.0.1474 Free Antivirus

WinArchiver 3.1 Portable Free Download Software





Download WinArchiver 3.1 Portable Full Version Free Software



Features:Open and extract zip, rar, 7z, and other archive files. WinArchiver can unzip all popular archives.Create zip, 7z, iso, and mzp files from hard disk files.Edit existing archive files.Mount zip, rar, and other files to virtual drives without extraction. You can use Win Archiver as a professional virtual drive

Free Download AOMEI Backupper 1.1 Full Version Software





 Download AOMEI Backupper 1.1 Free Full Version SoftwareFeatures:System Backup: One-click back up all data of system drive, including system files and installed applications without interrupting system run.Disk Backup: Backup your hard disk drives including MBR disk, GPT disk, external hard drive, USB disk, and other storage devices that can be recognized by Windows.System Recovery: Easily

Windows Repair (All in One) v1.9.9 Free Download





Download Windows Repair (All in One) v1.9.9 Free - Full Version Software



Features:Reset Registry PermissionsReset File PermissionsRegister System FilesRepair WMIRepair Windows FirewallRepair Internet ExplorerRepair MDAC & MS JetRepair Hosts FileRemove Policies Set By InfectionsRepair IconsRepair Winsock & DNS CacheRemove Temp FilesRepair Proxy SettingsUnhide Non System FilesRepair Windows

Adobe Dreamweaver CS6 12.2 Free Download Full Version





Download Adobe Dreamweaver CS6 12.2 Free Full Version Software



Features:*CSS3/HTML5 support. Style with the CSS panel, updated to support CSS3.*Live View now includes support for jQuery Mobile integration.*Native Android and iOS apps with Phone Gap.*Adobe Browser Lab integration.



DOWNLOAD LINKS:

Download Adobe Dreamweaver CS6 12.2 Free Software

Password: crackarchive.blogspot.com

Active File Recovery Professional 10.0 Free Download Full Version





Download Active File Recovery Professional 10.0 Free - Free Software - Full Version Features:Advanced filtering of volumes found by SuperScanBuilt-in signatures supported (Adobe *.pdf, RAR archives *.rar, Flash *.swf, QuickTime *.m4). User-defined signatures can be created and loadedIntegrated Active Disk Editor (HEX Viewer) and Active Organizer utilitiesReconstructs and recovers severely

Saturday, 23 March 2013

EASY WEBSITE HACKING FOR BEGINNERS|A Complete Guide

EASY WEBSITE HACKING FOR BEGINNERS |A Complete Guide| :


REMEMBER :

RULE 1. Destruction of anyone's hard work is a shame and nothing to be proud of!!!
RULE 2. All my Tutorials are for Educational Purpose Only and as usual I vehemently refuse to accept any responsibility for its Misuse.
RULE 3. In no way will I accompany you to any correctional facility or help pay the fine Imposed for being stupid enough to get caught in the first place!
RULE 4. REMEMBER to REMEMBER THAT YOU NEED TO USE FIREFOX!!!

STEP BY STEP INSTRUCTION :

* STEP 1. Go to GOOGLE!!!

* STEP 2. TYPE AND SEARCH FOR :

" Powered by EasySiteNetwork /category.php "
(REMEMBER : When you are choosing a site to hack, make sure you dont choose one mentioning about sql injection...)

* STEP 3. APPLYING THE EXPLOIT :
Make sure the url of the site you chose contains category.php somewhere in the link.Now copy the Script given below and starting from category.php highlight the rest of the url and replace it with the given script.

" /category.php?catid=1+union+select+111,222,concat_ws(char(58),login,password,email),444+from+users/* "

HIT Enter and notice the changes to the page.

* STEP 4. INTERPRETING THE RESULT :
The user information will be displayed along this format :
Username: Password: Email

NOTE: Incases having more then one username and password, then most likely the one displayed second is the Admin Account...


* STEP 5. LOGGING INTO THE ADMIN CONTROL PANEL :
In order to login to the Admin Control Panel, Just add the following extension to the original url :

" /siteadmin/index.php "

NOTE: In most cases you'll see the popup for the Admin Control Panel login, but if in few cases it is-int displayed or doesn't work, then just login like any other user would on the home page.


* STEP 6. Congrats!!! You are now logged into the Admin Control Panel and you have complete access to do as you please.(Doesnt mean you Deface a site!!!)
If you can find out the server or host on which your victims website is Hosted, you can even login to their FTP by typing in a false path!!!

If you are going to copy these posts...Don't forget to credit our work :)

Happy Hacking ;) !!!

Thursday, 21 March 2013

Power Point Tutorial in Urdu Full Traning with Video

MS Power Point Complet Video Tutorial
MS Power Point Complet Video Tutorial

What is Power Point?

Power Point is the slide maker software that is helps us to make beautiful presentation for explain our ideas and dreams for our student and also use PowerPoint in office presentation power point gave us very use full tools for make good-looking and nice-looking Slides.
Features of PowerPoint:
  • Beautiful and Good-looking Ribbon are use to view the tools of power point. 
  • In Ribbon Seven tabs are set by default but if you use other software like Nitro PDF convertor or Abbyy Fine Reader than his tab are also create Automaticity with power point.
  • Office Button Are provides use to very fast Power point command.
  • Groups the Ribbon tab includes to make a section into interrelated areas. Look at Font in addition to you will see the commands for intrepid, Italics, et cetera. Paragraph contains Bullets as well as Numbers, Centering e t c
  • Zoom in or Zoom out view are show on power Point in right side it help us for make a perfect size of slide making.
  • In Power point 2007 also Quick access toolbar area contains habitually used information and may be made to order by clicking on the arrow on the right face of Power point.
  • Power Point are keep in Pakage of MS Office that are provide use for using office work.
Power point Urdu tutorial are kept as under for your help if you don’t use how to work with power point than see followning video that will help you to making a beautiful slides.

MS Power Point Tutorial in Urdu:

Doraemon Nobita in Dorabian Nights (2012) Watch Online

Doraemon Nobita in Dorabian Nights Full Video
Doraemon a nice Carton which are Change our boring time with very enjoyfull time. This will gave a new dream of latest technicleas but this is cartoon not a real life so avide to use this story to attatch your life.

Wednesday, 20 March 2013

How to Hack Samsung Phone Screen Lock




I have discovered another security flaw in Samsung Android phones. It is possible to completely disable the lock screen and get access to any app - even when the phone is "securely" locked with a pattern, PIN, password, or face detection. Unlike another recently released flaw, this doesn't rely quite so heavily on ultra-precise timing.

Video.






Of course, if you are unable to download a

Tuesday, 19 March 2013

Xbox Live accounts hacked








Allegedly, the hackers who targeted Krebs did so because he helped to reveal the method by which they have been compromising the accounts of "Microsoft employees who work on the Xbox Live gaming platform," Krebs writes .

The method apparently involves acquiring and then utilizing the employees' social security numbers along with some social engineering to obtain access to those accounts.

SMAC : THE MAC ADDRESS CHANGER

SMAC : THE MAC ADDRESS CHANGER 

 

SMAC is a powerful and easy to use MAC Address Changer (Spoofer) for Windows systems, regardless of whether the network card manufacturers allow this option or not. Its features include:
  • Automatically Activate new MAC Address after changing it
  • Show the manufacturer of the MAC Address 
  • Randomly Generate any New MAC Address or based on a selected manufacturer
  • Pre-load MAC Addresses List and choose the new MAC address from the list.
  • IPConfig button - click to show network adapter (IPConfig) info to confirm changes
  • User-friendly GUI
Download here:

http://download.cnet.com/SMAC-MAC-Address-Changer/3000-2085_4-10536535.html

 

Ultimate hack pack 2:

Ultimate hack pack 2:
Apache Hacking TooLz Directory:
Apache Chunked Scanner
Apache Hacker Tool v 2.0
Apache H4x0r Script

Remote File Inclusion And Remote Command Execution Directory :
IIS 5 Dav Scanner & Exploiter
PHP Attacker
PHP Injection Scanner & Exploiter
XML-RPC Scanner & Exploiter

Databases & SQL Injection & XSS TooLz Directory:
Casi 4.0
ForceSQL
Mssql BruteForce TooL
SQL Ping 2
SQL Recon
SQL Vuln Scanner
SQL & XSS TooL

PHP Shells:
rootshell v2.0
c99shell #16
Backdoor php v0.1
r57shell
ajan
casus15
cmd (asp)
CyberEye (asp)
CyberSpy5 (asp)
Indexer (asp)
Ntdaddy (asp)
News Remote PHP Shell Injection
PHP Shell
phpRemoteView
nstview php shellb

http://uploading.com/files/d6b672f7/%20Ultimate_H4ack_p4ck_2.rar/

EMAIL SPAMMER

I though it would be interesting to share it here with you guys.

And use these email bombers in your dirty job:

I FOUND THIS FKING LIST OF BOMBER SO PLEASE SKIP THE ADD  ITS NOT MY OWN LINK SORRY FOR THAT 

1st Mass Mailer 4.2
This tool will help you to mass spam emails. Little bit complicated but very very effective.
Serial: "18935379480889"

Download

1st Mass Mailer 6.4
This tool will help you to mass spam emails. Little bit complicated but very very effective.
Thanks to elvinguitar for the serial

Download

Mess Bomber
This is also a spammer bot. Same as the previous one , can be used to spam any email you want quickly and easily.
Download

Fill-er-up collection
This 3 softwares are spammers. you can use these tools to spam any email you want very quickly and in only few steps. Ability to attach a file and to stop any time you want. Very effective. All credit go to Nathan72389
Download

Bomb Them!
This is also a spammer bot. Same as the previous one , can be used to spam any email you want quickly and easily. Ability to attach a file and to stop any time you want. All credit go to Nathan72389
Download

72389 Email Bomber
This tool will help you to spam any email you want. This one is special because you have the ability to spam from different email at the same time. All credit go to Nathan72389
Download

Vallen emailer
This tool will help you to spam the emails you want. Ability to choose between a rich text or an html text. Also you can attack files to the message. Try it from here
Download

BOMB MOBILE PHONE WITH SMS : BEAVER'S SMS BOMBER PRO | way2hackintosh

BOMB MOBILE PHONE WITH SMS : BEAVER'S SMS BOMBER PRO

note:- I AM NOT RESPONSIBLE FOR ANY KIND OF DAMAGE U MAKE 

This program will bomb the victim's mobile phone with tons of SMS. It supports all major networks around the world. But if your network is not in the list, then don't worry, you can also add the carrier network with the help of "custom" option. You can also load list of multiple victims and bomb them simultaneously. The improvement that Beaver has made in this version over his previous SMS Bomber is that you can spoof the email address from which you are bombing the victim's mobile phone. For Example, If there was an error sending the message, it will ask you if you wanna change the E-mail/Password you are using. All credits to Beaver for this nice program.

Download here 

JUST CLICK HERE AND FINE IT

or
http://www.mediafire.com/?oyicf11y9n11y9v 

comment for broken link 

Free BSNL 3G Hack & Trick 2013 ( 100% Working )

Hello Friends !! here is in 2013 latest fast proxy trick for BSNL  Network Users. This trick is working with Resume support with downloads and with YouTube, Facebook too. You can download by very fast speed also.This trick is working with 2G and 3G both.So just use it and enjoy super fast 3G speed for free.

it is also tested by me your admin jixxi :P so i guess its working

Trick 1
Use the Following New Connection For Free :-

  1. Name :3G free(any) 
  2. Service Type 1
  3.  WAP Gateway IP : 1 10.100.3.2 
  4. Port no : 1 : 9209. 
  5. Timeout: Never 
  6. CSD No.1 
  7. User Name1: ppp 
  8. Password1: ppp123 
  9. APN setting: wapwest.cellone.in 
  10. User Name : ppp 
  11. Password : ppp123
Now save the following settings and  leave the other settings as default and using this activated settings hack bsnl 3G for free new 2012 trick in bsnl mobile free for 3mbps speed browsing and downloading in bsnl 3G.

OR

Trick 2 :

Requirements:-

 1) You Must Have the 3G Supported Device . 2) 3G Activated SIM ( if you are not using 3G sim it is easy to change the plan to 3G)

 Knowledge about the changing of your internet settings. Change your Internet Settings with the Following Details :-

Name :- BSNL 3G Service
Type 1 WAP
Gateway IP : -1 10.100.3.2
Port no : 1 : 9209.
Timeout: NEVER
CSD No.1
User Name1: ppp
Password1: ppp123
APN setting: wapwest.cellone.in
User Name : ppp
Password : ppp123
By Using this Settings , you have the free internet service at 3 MBPS Speed.




Vodafone 2G & 3G Hack 2013 With Super Fast Speed By way2h

Hi Friends Today i will share the vodafone internet trick for 2013 .By this Trick you will get 6 GB Free Internet Data for 6 Months .This Latest Trick Already Tested before published in Rajasthan,Punjab,Haryana,West Bengol and other places .So hurryup



Process :-
Proxy Settings for Vodafone unlimited 3g Hack:-
Make these Settings as Below :-
Account Name:- HackingHomeMobileTrick
home page : live.vodafone.in
proxy:- 10.10.1.100
apn:- portalnmms
port:- 9401 or 8799

 just type ACT FB and then send the message to 144
after you will get conformation  msg and free internet for 6 month

if you want increase your internet data then try this again after 6 month

so enjoy and yeha keep your bal low \m/ comment if not working :)

Airtel 3G Unlimited GPRS Trick And Hack With Fastest Proxy 2013

Follow the Instructions Below :-
  1. Create A New Airtel Manual Settings
  2. Apn : airtelgprs.com
  3. Proxy : 208.77.23.4
  4. Port : 80
  5. Home Page : fb.me
  6. If Its Not Working Try live.airtelworld.com
  7. ....... read more click here 

CRETE ACCOUNT LOGIN AND READ REST OF THE TRICK 

Monday, 18 March 2013

Hacking NVidia Cards into their Professional Counterparts






I did originally post this on the nvidia forums but they have silently deleted it  , obviously they do not like what I have found becoming public  .



Firstly I will give a bit of history for those that are unaware. NVidia's has for a long time had two ranges of cards, the GeForce for the gaming market, and Quadro for the professional market, and more recently the Tesla range for high end

Website Hacking Tools Collection

Includes:
- Easy SQL Injection Tool

- MySQLi Dumper v1.4 Alpha

- Server Attack

- Shell upload video
- SQLi Helper v2.5

- Super Scan 4

- Link to web-page that finds the admin log-in page of any site
- c100 shell (php file)
- Cain and Abel

- SQL Injection detailed tutorial. Watch it together with Mathias's SQL Injection tutorial, and you'll master it in no time!
- Nessus

- Nmap

- WhoIs

- Ethereal v0.99

 FileFactory Mirror:

Code:
http://www.filefactory.com/file/agh3488/n/_Website_hacking_7z

TurboUpload Mirror:

Code:
http://www.turboupload.com/yf1fukydnu3r/^^_Website_hacking.7z.html

Password:

Code:
"gamefreak" or maybe its "Gamefreak"

Enjoy! Thumbsup
 

How To Find An IP On Skype

equirements -
  • Skype - Can be downloaded Here
  • CMD - Every computer has CMD (Start > All Programs > Accessories > Command Prompt)

Step 1.

[Image: skypedownload.png]

Step 2.
  • Add the slave you wish to IP Grab.
 Step 3.
  • After adding the slave, Make sure your Skype is like this shown in the picture. 
 Step 4.
  • Double click the slave you wish to IP Grab.
 Step 5.
  • Go to Start > All Programs > Accessories > Right-click Command Prompt (CMD) & Run As Administrator. 
Step 6.
  • Close unwanted applications that are open, Such as other opened Skype friends. Leave open the slave you wish to IP Grab.

Step 7.
  • In CMD (Command Prompt) Type " netstat -nbt " (without the quotes)

Step 8.
  • A whole bunch of stuff should come up. Find [Skype.exe]

Step 9.
  • Now there will be more then one Skype.exe which is why you have to close the unwanted tabs of Skype. Now there should be 4 Not More IP's.

Step 10.
  • All you have to do now is Track does 4 (Even less) IP's and one will occur to be the one your looking for.

Hope this Tutorial is helpful, A Thanks would be appreciated.


Sunday, 17 March 2013

Download Adobe Acrobat XI Professional v11.0.2 Multilingual Free





Download Adobe Acrobat XI Professional v11.0.2 Multilingual - Full Version SoftwareAdobe Acrobat XI Professional v11.0.2 Multilingual | 650 MBAdobe Acrobat XI Pro can be used for the following purposes:• Edit PDF files• Export from PDF files• Create PDF files• Creation and analysis of forms• Combine files• Simplifying the review and approval• Protect PDF files• Creation of PDF, MeetsSystem

Free Download FL Studio Producer Edition v10.10 & Samples





Download FL Studio Producer Edition v10.10 & Samples - Full Version Software



FL Studio Producer Edition v10.10 & Samples | 3.54 GBAdditions:Controllers - Support for Novation Launchpad &basic support for Launchkey.VFX Color Mapper - plugin (Patcher only).Select under Effects > MoreVFX Key Mapper - plugin (Patcher only).Select under Effects > MoreGross Beat - Click reduction featureenhanced

Download Adobe® Creative Suite 6 Design & Web Premium x86/x64 Free Software





Download Adobe® Creative Suite 6 Design & Web Premium x86/x64 - Free SoftwareAdobe® Creative Suite 6 Design & Web Premium

 | 6.2 GB | PC Features:Apple Recommends ForDesign content for a wide range of media, including print, web, interactive, and mobile devices.Adobe Creative Suite 6 Design & Web Premium combines:- Adobe Photoshop® CS6 Extended- Adobe Illustrator® CS6- Adobe InDesign® CS6-

Siemens Solid Edge ST5 MP4 build 105.00.04.03 (x86/x64) Free Download





Download Siemens Solid Edge ST5 MP4 build 105.00.04.03 (x86/x64) - Full Version Software



Siemens Solid Edge ST5 MP4 build 105.00.04.03 (x86/x64) 

Size | 6.02



DOWNLOAD LINKS:

Download Siemens Solid Edge ST5 Free Software

Password: crackarchive.blogspot.com

Friday, 15 March 2013

Hack a WiFi Network In 8 Easy Steps.( Using Windows)

It takes about 5-6 hours if the password is weak a high signal of the WiFi network you are going to hack and you have sometimes 10-12 for more complicated passwords and if the WiFi signal of the Network is weak .The time taken also changes if the WiFi network you are going to hack has many other clients already accessing it .  


those who know how to hack using backtrack please don't laugh its for beginner 
Tools needed :

Packet sniffer:
* Commview for WiFi ( check it website and see if ur wifi card is supported https://www.tamos.com/
products/commwifi/adapterlist.php )
{ get the 30 day trial or use the free full version available on net from other sites.) (i recomment the 30 day trial because it will be the latest ) after it expires y can always go to other means.

You will use this tool for capturing the packets sent and recieved through the Access Point you are going to hack .The more packets you capture the better chances of cracking the password .You will need more than 1,00,000 minium packets to crack the password .The packets will be captured in the .ncp format .You will use this tool to convert the .ncp to .cap .

NOT MANY NETWORK CARDS ARE SUPPORTED SO PLEASE CHECK YOUR NETWORK ADAPTER IN DEVICE MANAGER. IF it is not supported then there is no other option then to use backtrack with extra hardware.

Decrypter :

* Aircrack suite (http://www.aircrack-ng.org/)
You will use this tool to crack the password of the Access Point using the . Cap files you obtained from the Commview application .

NOTE  :
You will need a packet sniffing program (we will use Commview for WiFi) and not airodump-ng ( already integrated in aircrack suite).

Or if YOU can get another packet sniffer that support your card then use it instead of commonview.


Now Get Ready to Hack :

Step 1 : Install CommView for WiFi . It doesnt matter whether you install it in VoIP mode or Standard mode . I used VoIP . It automatically installs the necessary drivers . Allow it to install .

Note :- You will not be able to connect to any Network using WiFi when using CommView .

Step 2 : Click on the PLAY ICON in the Left First .

Step 3 (Choosing the Network (a) ) : A new window should pop up now. Click on the START SCANNING button .
 
 
Step 4 : (Choosing the Network (b) ) : Click on the WiFi network you want to hack in the Right Coulumn and Click on CAPTURE.


Note :- This tutorial is only for WEP protected networks .
 
 Step 5 : (Capturing the Packets) : The windows should close now and you should see that CommView has started Capturing Packets .
 Step 6 : (Saving the Packets ) : Now that the Packets are getting captured you need to Save them. Click on Settings->Options->Memory Usage Change Maximum Packets in buffer to 20000.
 
 
 
 
Click on the LOGGING Tab .
Check AUTO-SAVING
In the Maximum Directory Size : 5000
Average Log File Size : 50
 
 
Now CommView will automatically Start Saving packets in the .ncp format at a size of 20MB each in the specified directory .

Step 7 : ( Concatenating the Logs ) : Since you are capturing a lot of logs you will need to concatenate them into once file . To do this go to Logging and click on CONCATENATE LOGS Choose all the files that have been saved in your specified folder and Concatenate them .

Now you will have one .ncf file .

Step 8 : (Converting .ncf to .cap ) : Now that you have one file with all the packets you need to Convert it into .cap file for AIRCRACK to crack .

Click on File->Log Viewer->Load Commview Logs-> Choose the .ncf file. Now File->Export->Wireshark/TCP dump format .

Aircrack Part :

Now for the Second Part Cracking this is very simple . Just open the Aircrack Folder->Bin->Aircrack-ng GUI.exe Choose the .cap file and you should be able to do the others .
 Also select the encryption(WEP or others) and Key size (64). Press launch and the key will be revealed.
or try other settings if not working.

Thursday, 14 March 2013

How to Hack 30+ Highly Popular Websites



# March 13, 2013
# FULL-DISCLOSURE Exclusive - Vielen Dank John!
#
# VULNERABILITY SUMMARY
# ---------------------
# A confirmed security vulnerability has been identified with 30 high traffic web
# sites owned by QuinStreet.   Vendor stores database IDs in cookies which are
# easily spoofed (USERID_COOKIE), allowing all user information to be accessed. 
# Seven million users are reportedly in

EXPLANATION ABOUT ENCRYPTION,HASHING ALGORITHMS,SALTS AND DECRYPTION


EXPLANATION ABOUT ENCRYPTION,HASHING ALGORITHMS,SALTS AND DECRYPTION !!!!




1.Encryption&Hash

In cryptography, encryption is the process of transforming information (referred to as plaintext) using an algorithm (called cipher) to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key. The result of the process is encrypted information (in cryptography, referred to as ciphertext). In many contexts, the word encryption also implicitly refers to the reverse process, decryption (e.g. “software for encryption” can typically also perform decryption), to make the encrypted information readable again (i.e. to make it unencrypted). Hashing is a one way encryption. That means that it is not possible to use a reverse algorithm in order to come back from the hash to the password. Any way people found a way to crack hashes by using a bruteforce or dictionary attacks. Because of this hashing was made even more secure. After reading the whole tutorial you will get the point.

2.Hashing Algorithms

Cracking any hash is not that simple like running a bruteforcer. Sometimes a bruteforcer or a dictionary attack will do the job but only in a very rare situations where the algorithm is a plain md5 and where the hash is without salt. Plain md5 algorithm ? What does that mean ? Nowadays people use more complicated algorithms in order to increase the security. For example a plain md5 is an algorithm like this:


Code:
md5($pass)

What is this going to do ? This is going to make a md5 hash from the given pass. But what happens if you have something like this:

Code:
md5(md5($pass))

This makes first one md5 from the password and then another md5 hash from the new generated md5. So for example if the password is HI the results will be:

Code:
first one : md5("HI") = "bf8c144140b15befb8ce662632a7b76e"
second one: md5(md5"HI") = "ce8441edc9a85ed9839a849f99ed5ecc"

So as you can see for a same password we have two different MD5s. That is why when you are trying to crack a MD5 or any other hash ( the upper mentioned cases are the same for any other encryption out there ) it is very important to know the algorithm that was used to generate those hashes coz otherwise bruteforcing will have no sense and you will be stuck forever... There for always use a bruteforcer that allows you to enter the hash algorithm so that you can be sure that eventually you will find the password...

3. SALTS

What is a Salt ? Why do people use Salts ? Hashing became even more secure way of encrypting passwords with the use of Salts. Salt is actually a random pass phrase that is added to the main password. How it is added depends from the algorithm that was used. Salts are being used coz bruteforcing a salted hash without knowing the Salt is impossible. For example imagine that you have a password HI. See what happens in the next cases if we take 1234567890 for a salt:

Code:
md5($pass) => md5("HI") = "bf8c144140b15befb8ce662632a7b76e"
md5($pass,$salt) => md5("HI1234567890") = "4f4d880dbc772fb6acba84a98bce6136"

That is why cracking a salted hash without knowing the hash is impossible... But what happens if we know that salt ? Then we need to specify in our bruteforcer like previous mentioned the algorithm in our case => md5($pass,$salt) and we need to specify the salt. Knowing this the bruteforcer will perform the attack like a normal bruteforce except it will add the salt to every combination he makes. On the paper it goes like this :

Code:
A1234567890
AA1234567890
AAA1234567890
.
.
.

...and so on and so on. So basically every combination will end with 1234567890 and the only thing generated will be the thing before 1234567890. The use of Salts as you can see makes hashing even more secure.

4. Cracking

Cracking was mentioned during the whole tutorial but in here I will make a precise list of what you need to think before starting with decryption.

- First of all you need to figure out what type of hash do you have ( md5, sha1, mysql... )
- Then you need you need to see figure out if the hash is salted or not. If the hash is salted then you need the salt aswell
- Having the salt is not enough. You need to find the algorithm that was used. Only then you will be able to start with the decryption.
- If you came to all this things somehow you are ready to start with decryption.

Wednesday, 13 March 2013

How to Hack Any Facebook Account...Again!











just to clarify there is no need for any installed apps on the victim's account, Even if the victim has never allowed any application in his Facebook account I could still get full permission on his account via Facebook Messenger app_id (This bug works on any browser),




Also, It's important to mention that there is a special regex protection in Facebook Messenger app_id (app_id=

Kali Linux Released by BackTrack Team With 300+ Hacking Tools

Seven years of developing BackTrack Linux has taught us a significant amount about what we, and the security community, think a penetration testing distribution should look like. We’ve taken all of this knowledge and experience and implemented it in our “next generation” penetration testing distribution.

After a year of silent development, we are incredibly proud to announce the release and public availability of “Kali Linux“, the most advanced, robust, and stable penetration testing distribution to date.


Kali is a more mature, secure, and enterprise-ready version of BackTrack Linux. Trying to list all the new features and possibilities that are now available in Kali would be an impossible task on this single page. We therefore invite you to visit our new Kali Linux Website and Kali Linux Documentation site to experience the goodness of Kali for yourself.


We are extremely excited about the future of the distribution and we can’t wait to see what the BackTrack community will do with Kali. Sign up in the new Kali Forums and join us in IRC in #kali-linux on irc.freenode.net and help us usher in this new era.



ARP Poisoning - FULL EXPLANATION

Being one of the most active members in this WiFi board I can see that a lot of people don't understand this in depth but they only know why are we using it and what is the result. In this thread I will explain to all of you that already know something about this and to all of you that doesn't know a thing for this what exactly is ARP and ARP Poisoning. In this thread I will explain what actually happens in the background of the attack.


What is ARP ?


ARP Poisoning is one of the most famous network hacking attacks but only a few people understand what happens in the background. In order to understand this attack better first I will explain what exactly is ARP. ARP or Address Resolution Protocol is a network protocol that resolves IP addresses to MAC addresses. It is a protocol that connects the Logical Addressing(IP) with the Physical Addressing(MAC) of the networking scheme. In networking you have Layers. Imagine them as different levels. Each layer/level has his own job. These are the 7 Layers according to the OSI Model:

 The Address Resolution Protocol is between the NETWORK LAYER and the DATA LINK LAYER. I know that this looks a bit strange for those of you who haven't worked with networking but if you read a bit about the layers you will understand it better. So once again... ARP is in charge of RESOLVING IP ADDRESSES TO MAC ADDRESSES.


ARP Poisoning


Now that you understand what ARP is I can explain the ARP poisoning to you. I am not sure when exactly but people found a way to trick the ARP. Actually ARP Poisoning is a process where we send a fake or "spoofed" ARP messages to a LAN. Those actually resolve the gateway IP address to our MAC address. There for all the traffic that is meant to be for the gateway goes through US ( this is not the UNITED STATES !!! Roflmao ). So actually what we do is we tell the gateway that we are the slave and we tell the slave that we are the gateway. Illustrated it looks like this:

 In this image the attacker performed ARP poisoning between 2 users on the networks. Therefor each traffic that is from slave A for slave B will first go through the attacker and then he will resend it to its original destination. And vise versa. Each traffic from slave B for slave A goes through the attacker. That is why ARP Poisoning is used for sniffing. All the traffic goes through you and you can analyze the packets passing by with no problems.



Pakistani Student Rewarded by $500 USD for detecting HTML Injection Vulnerability in Facebook

Haider Mehmood Qureshi, an independent security researcher from Islamabad has been rewarded with $500 for detecting HTML Injection Vulnerability in Facebook. 

According to Haider, Facebook was vulnerable in HTML code, their are some serious Remote HTML injection. Remote User was able to add any brand Name and Radio buttons, hence allowing Remote HTML injection. It was as simple as it sounds. The issue can also cause adding junk/spam entries into the database.



Bug details:

Vulnerability title: HTML Injection
Vendor homepage: http://m.facebook.com
Remote/Local: Remote
Tested on: Windows 7 64 bit Firefox browser (but should have worked on other OS and browsers (not sure about IE))
Vulnerability Submitted on: 12/1/2013
Vulnerability Status: FIXED


Detail: Facebook mobile provides a survey to evaluate the mobile user experience as they surf Facebook mobile site. Here is the survey https://m.facebook.com/survey.php . While entering the mobile phone brands , it provides a list of brands in case you didn't type the correct brand.


The list that was provided contained their HTML code inside the parameter https://m.facebook.com/survey.php?incorrect_brand&params=[HTML code of Brands and Radio Buttons]
Remote User was able to add any brand Name and Radio buttons, hence allowing Remote HTML injection. It was as simple as it sounds. The issue can also cause adding junk/spam entries into the database.



Haider Mehmood Qureshi, BS Computer Sciences Student from Comsats Intitute of information technology Islamabad. Started learning pentesting/hacking in 2009. Initially was into defacing, later realized to make Pentesting/security auditing as my career. His Friends motivated him to go for bug bounties. 
Contact: haidermehmoodqureshi@yahoo.com


Monday, 11 March 2013

TOP WEBSITES TO LEARN HOW TO HACK PROFESSIONALLY




Hacking is definitely not as easy as shown in various movies, still there are thousands of newbies who wants to learn hacking for one or another reason but don’t know where to start from. So, below is a list of some website to start your journey.

list of various Ethical hacking Sites

Backtrack: Rating (5/5)

No need to introduce this software. If you have a little bit of experience in

Saturday, 9 March 2013

DarkComet V4.2 RAT TUTORIAL

If you are not new to RATs, you should have heard the word DarkComet. Because DarkComet is such a great tool for hacking remote computers. It has several features that many RATs do not have. I have explained the basics of RATs and Setting up Extreme RAT in my previous articles. So before proceeding into this article, you must understand the basics of RATing. So please go through those articles first. You can read them from here.

Things you require

1) DARK-COMET RAT

This is the RAT you are going to use. You can get it from HERE.

2) No-ip.biz  account

As our IP-Address is dynamic(in general), we need to make it static.

3) DUC client

We can automatically update our dynamic IP-Adress, by installing DUC client.

4) VPN (If you are behind a router)  VPN is here  also know what vpn is

We must enable our router to allow us to connect to a remote PC. So we need to port forward.
Instead of port forwarding we use a VPN(Virtual Private Network).
You can use Proxpn. and any other you know (its not needed but good if u use) 

Procedure:
 
Step 1:

First you need to create an account in www.no-ip.com

Step 2:

After creating an account, login with your account and create a host. You can do this by just following the steps.

Goto this link, and login. Then follow the steps as shown in the picture.
 
 
 
Finally click “Create Host”.

Step 3: Setting up your server.

First install Dark-Comet RAT on your PC and run it. It opens a window as shown below.
 
Now click on the + button which is at left bottom corner as shown below. 
 

 It opens a small window showing you the port number. Click on “listen” button.


Then it disappears, don’t click the “listen” button again. Now click on “edit server” button at the bottom of the window as shown in the figure.

 It opens a new window with huge amount of options. First lets move on to the main settings. You can set a password to use when listening connections. You can see the default password by checking “security password” and “show chars” in the following picture.

Now we need to set up our “network settings”. Clearly follow the steps here. You need to give your domain name you got from no-ip.com
It looks like yourdomain.no-ip.biz
 
  
We came to the funniest part of our RAT setup. Here you can choose your icon. DarkComet is providing us some beautiful icon. So that our victim can easily believe us. Just follow steps  shown in the figure. It is self explanatory.
 
 
You can bind your server file with a PDF or Image. So when the victim clicks it, it opens the PDF file and the victim will not be able to suspect you. You can follow the steps as shown in the figure. 
Finally click on “Build Server” button. It creates a new server file in the same directory where your dark-comet files are stored.

You are done. 
 Now give your server file to your vicyim by any means. When  he clicks the server file, he will be connected to your computer.

Now you can do anything you want. You can see him with his web cam, downloading files and many more. Just move around the options and play with him. I put two screenshots of how it looks like when you get access to his computer. 

Using RATs on remote systems without their permission is illegal. This article is for educational purpose only. Don't do anything illegal. I will not be held responsible for that.